Users are not the enemy, Communications of the ACM, vol.42, issue.12, pp.40-46, 1999. ,
A review of the tip-of-the-tongue experience, Psychological bulletin, vol.109, issue.2, pp.204-223, 1991. ,
The tip of the tongue phenomenon, Journal of Verbal Learning and Verbal Behavior, vol.5, issue.4, pp.325-337, 1966. ,
, , 2006.
A simple text-based shoulder surfing resistant graphical password scheme, IEEE 2nd International Symposium on Next-Generation Electronics, pp.161-164, 2013. ,
How secure is my, 2016. ,
, Dictionary of linguistics and phonetics, vol.30, 2011.
On user choice in graphical password schemes, Proceedings of The 13th USENIX Security Symposium, pp.151-164, 2004. ,
Tip-of-the-tongue phenomenon-dictionary definition of tip-of-the-tongue phenomenon, 2016. ,
A new graphical password: Combination of recall & recognition based approach, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol.8, issue.2, pp.320-324, 2014. ,
2-round hybrid password scheme, International Journal of Computer Engineering and Technology (IJCET, vol.3, issue.2, pp.579-587, 2012. ,
A survey on shoulder surfing resistant text based graphical password schemes, International Journal of Science and Research (IJSR), vol.3, issue.4, pp.747-750, 2014. ,
, Password strength checker, 2017.
, , 2017.
Novel shoulder-surfing resistant authentication schemes using text-graphical passwords, International Journal of Information and Network Security, vol.1, issue.3, pp.163-170, 2012. ,
Tip-of-the-tongue (TOT) states: Retrieval, behaviour, and experience, Memory & Cognition, vol.39, issue.5, pp.737-749, 2011. ,
Recognition memory for words, sentences and pictures, Journal of Verbal Learning and Verbal Behaviour, vol.6, pp.156-163, 1967. ,
Authentication schemes for session passwords using color and images, International Journal of Network Security & Its Applications, vol.3, issue.3, pp.111-119, 2011. ,
Exploiting predictability in click-based graphical passwords, Journal of Computer Security, vol.19, issue.4, pp.669-702, 2011. ,
Twostep: An authentication method combining text and graphical passwords, International Conference on E-Technologies pp, pp.233-239, 2009. ,
A study of perceptions of graphical passwords ,
, Accessed 2, 2016.
Password memorability and security: Empirical results, IEEE Privacy & Security, vol.2, issue.5, pp.25-31, 2004. ,
The security of modern password expiration: An algorithmic framework and empirical analysis, Proceedings of the 17th ACM conference on Computer and communications security, pp.176-186, 2010. ,
S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme, Advanced Information Networking and Applications Workshops, vol.2, pp.467-472, 2007. ,